Leaked NSA Dump Also Contains Tools Agency Used to Track Other Hackers.


A years ago when the mysterious hacking group ‘The Shadow Brokers‘ dumped a massive trove of sensitive data stolen from the US intelligence agency NSA, everyone started looking for secret hacking tools and zero-day exploits.

A group of Hungarian security researchers from CrySyS Lab and Ukatemi has now revealed that the NSA dump doesn’t just contain zero-day exploits used to take control of targeted systems, but also include a collection of scripts and scanning tools the agency uses to track operations of hackers from other countries.

According to a report published today by the Intercept, NSA’s specialized team known as Territorial Dispute(TeDi) developed some scripts and scanning tools that help the agency to detect other nation-state hackers on the targeted machines it infects.

NSA hackers used these tools to scan targeted systems for ‘indicators of compromise’ (IoC) in order to protect its own operations from getting exposed, as well as to find out what foreign threat actors are stealing and which hacking techniques they are using.

“When the NSA hacks machines in Iran, Russia, China and elsewhere, its operators want to know if foreign spies are in the same machines because these hackers can steal NSA tools or spy on NSA activity in the machines,” the publication reports.

“If the other hackers are noisy and reckless, they can also cause the NSA’s own operations to get exposed. So based on who else is on a machine, the NSA might decide to withdraw or proceed with extra caution.”

NSA’s Territorial Dispute team maintains a database of digital signatures, like fingerprints for file and snippets from various hacking groups, to track APT operations for attribution.

More: https://thehackernews.com/2018/03/nsa-hackers-tracking.html?m=1

Mais do que uma solução tecnológica, somos uma decisão estratégica para as organizações.

Nossa missão é redefinir a relação das empresas com a cibersegurança e a experiência dos usuários no processo de autenticação e acesso a ativos tecnológicos.